General
-
Target
6e256d70f40690d1daf4f96c85b6a41724f7d2b8fa5ec2de2175eba4e631f40c
-
Size
703KB
-
Sample
250115-qa75batkes
-
MD5
2f00f609b9f792cd152b5a64770e34ec
-
SHA1
853a43b6a328bc749370d6ed8d91ba2d2b03a4c9
-
SHA256
6e256d70f40690d1daf4f96c85b6a41724f7d2b8fa5ec2de2175eba4e631f40c
-
SHA512
e73fe498b7e4bf0d3ef03f29d23e3c1aeb04feeac8a94e9354ec5e29d7f6423321902923d634edb8485add9b7f5ebb50f5589bf8a65c1dd97e31fe2beb324ccc
-
SSDEEP
12288:y7aV2iENmInsjp4P9zwqPT36sPq/aHtYWMm4Tr6hY5yoHpVQS0+zuKnp5+2:y7GEorSF8S36sPq/6r4WS00uKpI2
Static task
static1
Behavioral task
behavioral1
Sample
BJ Energy Solutions ORDER_O.50338 2024-25604.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
BJ Energy Solutions ORDER_O.50338 2024-25604.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.vimet.com.vn - Port:
587 - Username:
[email protected] - Password:
auHM5EXeLggV
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.vimet.com.vn - Port:
587 - Username:
[email protected] - Password:
auHM5EXeLggV - Email To:
[email protected]
Targets
-
-
Target
BJ Energy Solutions ORDER_O.50338 2024-25604.exe
-
Size
740KB
-
MD5
27d1b2cef85d775a968297c64afdce9a
-
SHA1
bb8cc8a94bb21a46aaf32950e08678a0f0cb496c
-
SHA256
6f50875abceaba552313a0210af7cd248a4719b2d992de3f40f716dd0c04ca0a
-
SHA512
17d8882e69a308635ad842d801647c0fd607d432034b2aa2cece79683c9a3413267a636d62de78e363207a6febcb5c539a1aa15b397d900aace97b9a6b48de81
-
SSDEEP
12288:kPiEp0IPsjpaPpzwOPT36sPe/aHZYWom0Tr6HYTyoDpbQS0+zuql7:kKEWX8h8m36sPe/6X88S00uq
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-